Need Help? We are right here!
Thanks for your inquiry.
If you dont hear from us within 24 hours, please feel free to send a follow up email to firstname.lastname@example.org
Red Hat Enterprise Virtualization for Desktops complete desktop environments are hosted virtually. Users connect to these virtual desktops using either inexpensive thin clients or re-purposed PCs. No data is actually stored on the thin client - it's stored in a secure centralized location and can be accessed from anywhere. Red Hat Virtualization is an open, software-defined platform that virtualizes Linux and Microsoft Windows workloads.
VDI is a desktop-centric service that hosts user desktop environments on remote servers and storage systems, which are accessed over a network using a remote display protocol. Enterprises are converting physical desktops to Virtual Desktop Infrastructure (VDI) since it provides efficient hardware utilization and centralized management while reducing costs.
Due to the COVID-19, many companies need to find some ways to enable remote working. VDI solution is one of their choices. RedHat Virtualization for Desktop can provide a quick win VDI solution but it still need to spend efforts to setup for some authentications and security settings, e.g. MFA. For some SME companies, they may not have their own RADIUS (Remote Authentication Dial-In User Service) server and OTP (one-time password) server to enable 2FA/MFA. miniOrange provides a ready to use Two-Factor Authentication - 2FA solution for Sangfor aDesk VDI using RADIUS Server which enables an extra layer of authentication to VDI logins & ensures that you roll out secure access to your employees within minutes.
To use miniOrange Two-FActor Authentication (2FA) you can enable RADIUS authentication in RedHat Virtualization for Desktop and configure policies in miniOrange to enable or disable 2FA for users.
The 2-factor authentication can be of two types depending on the Application.
miniOrange provides user authentication from various external directories such as miniOrange Directory, Microsoft AD, Azure Active Directory/LDAP, AWS Cognito and many more.
Can't find your Directory? Contact us on email@example.com
|Client Name:||Any name for your reference.|
|Client IP:||IP address of VPN server which will send Radius authentication request.|
|Shared Secret:||Security key.
For Eg. "sharedsecret"
(Keep this with you, you will need to configure same on VPN Server).
|Do not Support Challenge:||Keep this Unchecked.|
|Group Name:||Group for which the policy will apply.|
|Policy Name:||Any Identifier that specifies policy name.|
|Login Method||Login Method for the users associated with this policy.|
|Enable 2-Factor Authentication||Enables Second Factor during Login for users associated with this policy.|
|Enable Adaptive Authentication||Enables Adaptive Authentication for Login of users associated with this policy.|
Only For On-Premise Version
Step 1: Open Firewall Ports.
|Label||The name of this configuration. Eg:miniOrange Radius|
|Hostname/Address||For on-premise version: IP of server where IDP(miniOrange) is installed
For cloud version: Contact us at firstname.lastname@example.org to get the IP
|Authentication Port||Enter 1812 (or whichever port configured on your miniOrange Authentication Proxy).|
|Authentication type||Must be PAP.|
|Shared secret code||Enter the Shared secret that we used to configure RADIUS app in miniOrange IDP.
In step 1 we configured the shared secret as "sharedsecret"
|Server timeout (in seconds)||Increase the timeout to 90 seconds.|
|Max attempts||Number of times to send authentication request. Must be 1.|
miniOrange provides user authentication from various external sources, which can be Directories (like ADFS, Microsoft Active Directory, Azure AD, OpenLDAP, Google, AWS Cognito etc), Identity Providers (like Okta, Shibboleth, Ping, OneLogin, KeyCloak), Databases (like MySQL, Maria DB, PostgreSQL) and many more. You can configure your existing directory/user store or add users in miniOrange.
1. Create User in miniOrange
2. Bulk Upload Users in miniOrange via Uploading CSV File.
Here's the list of the attributes and what it does when we enable it. You can enable/disable accordingly.
|Activate LDAP||All user authentications will be done with LDAP credentials if you Activate it|
|Sync users in miniOrange||Users will be created in miniOrange after authentication with LDAP|
|Fallback Authentication||If LDAP credentials fail then user will be authenticated through miniOrange|
|Allow users to change password||This allows your users to change their password. It updates the new credentials in your LDAP server|
|Enable administrator login||On enabling this, your miniOrange Administrator login authenticates using your LDAP server|
|Show IdP to users||If you enable this option, this IdP will be visible to users|
|Send Configured Attributes||If you enable this option, then only the attributes configured below will be sent in attributes at the time of login|
Refer our guide to setup LDAPS on windows server.
miniOrange integrates with various external user sources such as directories, identity providers, and etc.
Contact us or email us at email@example.com and we'll help you setting it up in no time.
Our Other Identity & Access Management Products
Seamless login for workforce and customer identity to cloud or on-premise appsLearn more
Secure access for identities with an additional layer of authenticationLearn more